DOI QR코드

DOI QR Code

Personal Information Overload and User Resistance in the Big Data Age

빅데이터 시대의 개인정보 과잉이 사용자 저항에 미치는 영향

  • Received : 2013.03.16
  • Accepted : 2013.03.21
  • Published : 2013.03.31

Abstract

Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.

최근 주목 받기 시작한 빅데이터 기술은 대량의 개인 정보에 대한 접근, 수집, 저장을 용이하게 할 뿐만 아니라 개인의 원하지 않는 민감한 정보까지 분석할 수 있게 한다. 이러한 기술이나 서비스를 이용하는 사람들은 어느 정도의 프라이버시 염려를 가지고 있으며, 이것은 해당 기술의 사용을 저해하는 요인으로 작용할 수 있다. 대표적 예로 소셜 네트워크 서비스의 경우, 다양한 이점이 존재하는 서비스이지만, 사용자들은 자신이 올린 수많은 개인 정보로 인해 오히려 프라이버시 침해 위험에 노출될 수 있다. 온라인 상에서 자신이 생성하거나 공개한 정보일 경우에도 이러한 정보가 의도하지 않은 방향으로 활용되거나 제3자를 의해 악용되면서 프라이버시 문제를 일으킬 수 있다. 따라서 본 연구는 사용자들이 이러한 환경에서 인지할 수 있는 개인정보의 과잉이 프라이버시 위험과 염려에 어떠한 영향을 주는지를 살펴보고, 사용자 저항과 어떠한 관계가 있는지 분석한다. 데이터 분석을 위해 설문과 구조방정식 방법론을 활용했다. 연구결과는 소셜 네트워크 상의 개인정보 과잉 현상은 사용자들의 프라이버시 위험 인식에 영향을 주어 개인의 프라이버시 염려 수준을 증가 시키는 요인으로 작용할 수 있음을 보여준다.

Keywords

References

  1. Ahn, C. W. and S. G. Hwang, "Big Data technologies and main issues", J ournal of Korean Institute of Information Scientist and Engineers, Vol.30, No.6(2012), 10-17.
  2. Bhattacherjee, A., "Understanding Information Systems Continuance : An Expectation- Confirmation Model", MIS Quarterly, Vol. 25, No.3(2001), 351-370. https://doi.org/10.2307/3250921
  3. Beaudoin, C. E., "Explaining the relationship between Internet use and interpersonal trust : Taking into account motivation and information overload", Journal of Computer- Mediated Communication, Vol.13, No.3(2008), 550-568. https://doi.org/10.1111/j.1083-6101.2008.00410.x
  4. Dinev, T. and P. Hart, "An extended privacy calculus model for e-commerce transactions", Information Systems Research, Vol. 17, No.1(2006), 61-80. https://doi.org/10.1287/isre.1060.0080
  5. Furneaux, B. and M. Wade, "The end of the information system life : a model of is discontinuance", SIGMIS Database, Vol.41, No2(2010), 45-69. https://doi.org/10.1145/1795377.1795381
  6. Featherman, M. S. and P. A. Pavlou, "Predic ting e-services adoption : a perceived risk facets perspective", International Journal of Human-Computer Studies, Vol.59, No.4 (2003), 451-474. https://doi.org/10.1016/S1071-5819(03)00111-3
  7. Fogel, J. and E. Nehmad, "Internet social network communities : Risk taking, trust, and privacy concerns", Computers in Human Behavior , Vol.25, No.1(2009), 153-160. https://doi.org/10.1016/j.chb.2008.08.006
  8. Havlena, W. J. and W. S. DeSarbo, DeSarbo, On the Measurement of Perceived Consumer Risk", Decision Sciences, Vol.22, No.4 (1991), 927-939. https://doi.org/10.1111/j.1540-5915.1991.tb00372.x
  9. Jo, D. H., J. W. Park, and H. J. Chun, "The relationships among perceived value, usediffusion, loyalty of mobile instant messaging service", Journal of Intelligence and Information Systems, Vol.17, No.4(2011), 193-212.
  10. Kim, H., I. Son, and D. Lee, "The Viral Effect of Online Social Network on New Products Promotion : Investigating Information Diffusion on Twitter", Journal of Intelligence and Information Systems, Vol.18, No.2(2012), 107-130.
  11. Kim, M. S., H. J. Kim, M. O. Kim, and H. J. Kim, "A Study on the User Resistance to IPTV", The Journal of Society for e-Business Studies, Vol.15, No.2(2010), 205-217.
  12. Kim, S. S. and N. K. Malhotra,, "A Longitudinal Model of Continued Is Use : An Integrative View of Four Mechanisms Underlying Postadoption Phenomena", Management Science, Vol.51, No.5(2005), 741-755. https://doi.org/10.1287/mnsc.1040.0326
  13. Korea Communication Commision National Internet Development Agency of Korea, "Survey on Internet users' SNS use", 2009.
  14. Ku, G. T. and H. J. Choi, "A Study of the impact of information overload on emotional and physical health", Korean Political Communication Association, Vol.16, No.1(2010), 5-32.
  15. Lapointe, L. and S. Rivard, "A multilevel model of resistance to information technology implementation", MIS Quarterly, Vol.29, No.3(2005), 461-491. https://doi.org/10.2307/25148692
  16. Mason, R. O., "Four ethical issues of the information age", MIS Quarterly, Vol.10, No.1 (1986), 5-12. https://doi.org/10.2307/248873
  17. McKinsey Global Institute, "Big data : The next frontier for innovation, competition, and productivity", 2011.
  18. Norberg, P. A., D. R. Horne, and D. A. Horne, "The privacy paradox : Personal information disclosure intentions versus behaviors", Journal of Consumer Affairs, Vol.41, No.1 (2007), 100-126. https://doi.org/10.1111/j.1745-6606.2006.00070.x
  19. Pavlou, P. A. and D. Gefen, "Building Effective Online Marketplaces with Institution- Based Trust", Information Systems Research, Vol.15, No.1(2004), 37-59. https://doi.org/10.1287/isre.1040.0015
  20. Peslak, A. R., "PAPA revisited : A current empirical study of the Mason framework", Journal of Computer Information Systems, Vol.46, No.3(2006), 117-123.
  21. Ram, S., "A Model of Innovation Resistance", Advances in Consumer Research, Vol.14, No.1(1987), 208-212.
  22. Ryu, I., K. Y. Nah, and H. R. Choi, "A Study on the Factor of User Resistance to Electronic Commerce", The Journal of Information Technology, Vol.2, No.1(1999), 108-130.
  23. Sanford, C. and H. Oh, "The role of user resistance in the adoption of a mobile data service", Cyber psychology, Behavior, and Social Networking, Vol.13, No.6(2012), 663-672.
  24. Schultz, U. and Vandenbosch, B., "Information overload in a groupware environment: Now you see it, now you don't", Journal of Organizational Computing and Electronic Commerce, Vol.8, No.2(1998), 127-148. https://doi.org/10.1207/s15327744joce0802_3
  25. Watters, A., "The age of exabytes : Tools and approaches for managing big data", 2012.
  26. Lee, Y. and O. Kwon, "Model based approach to estimating privacy concerns for context- aware services", Journal of Intelligence and Information Systems, Vol.16, No.2(2009), 97-111.

Cited by

  1. Intelligent Brand Positioning Visualization System Based on Web Search Traffic Information : Focusing on Tablet PC vol.19, pp.3, 2013, https://doi.org/10.13088/jiis.2013.19.3.093
  2. Privacy risk of Social network service and User Resistance vol.15, pp.3, 2013, https://doi.org/10.15719/geba.15.3.201406.321
  3. 활용 주체별 빅데이터 수용 인식 차이에 관한 연구: 활용 목적, 조직 규모, 업종 특성을 중심으로 vol.24, pp.1, 2013, https://doi.org/10.22693/niaip.2017.24.1.079
  4. 전자정부서비스에 대한 개인정보제공의 영향요인 vol.26, pp.1, 2013, https://doi.org/10.5859/kais.2017.26.1.53
  5. Korean Voters’ Reaction to an Election Campaign Using Big Data vol.56, pp.None, 2013, https://doi.org/10.17939/hushss.2017..56.003
  6. 빅데이터 연구 논문의 주제 분야 연관관계 분석: 동시 인용 관계를 적용하여 vol.35, pp.1, 2013, https://doi.org/10.3743/kosim.2018.35.1.013
  7. Impacts of Female College Students’ Perceived Security on Attitude Toward SNS after Reading Privacy Policies of SNS vol.21, pp.4, 2013, https://doi.org/10.17053/jcc.2018.21.4.006